Search alternatives:
processing algorithm » processing algorithms (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
Showing 61 - 80 results of 204 for search '(( element update algorithm ) OR ((( image processing algorithm ) OR ( data existing algorithm ))))', query time: 0.13s Refine Results
  1. 61

    Advancing Data Center Networks: A Focus on Energy and Cost Efficiency by Zina Chkirbene (16869987)

    Published 2023
    “…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …”
  2. 62

    Applications of artificial intelligence in ultrasound imaging for carpal-tunnel syndrome diagnosis: a scoping review by Yosra Magdi Mekki (21673721)

    Published 2025
    “…Studies were included if they focused on the application of AI in US imaging for CTS diagnosis. Editorials, expert opinions, conference papers, dataset publications, and studies that did not have a clear clinical application of the AI algorithm were excluded.…”
  3. 63

    The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs by Muhammad Kashif (3923483)

    Published 2023
    “…One of the prominent challenges lies in the presence of barren plateaus (BP) in QML algorithms, particularly in quantum neural networks (QNNs). …”
  4. 64

    Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models by Theng, Lau Wei

    Published 2022
    “…Pre-processing on the dataset is required to standardize the dataset by resizing the image into 224 * 224 pixels, convert into jpg format and augmentation. …”
    Get full text
  5. 65

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection by HAMDALLAH, KHALID WAJIH TURKI

    Published 2011
    “…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
    Get full text
  6. 66

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices by Samir, Moataz

    Published 2019
    “…This motivates the utilization of unmanned aerial vehicles (UAVs) to offload traffic from existing wireless networks by collecting data from time-constrained IoT devices with performance guarantees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 67

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 68

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array by Amran Hossain (570706)

    Published 2022
    “…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …”
  9. 69
  10. 70
  11. 71

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…Devices in such scenarios are normally extremely energy-constrained and often exist in large numbers and can be located in hard-to-reach areas; the fact that necessitates the design and implementation of effective energy-aware data collection mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 72

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
  13. 73
  14. 74
  15. 75

    Prediction of EV Charging Behavior Using Machine Learning by Shahriar, Sakib

    Published 2021
    “…Using data-driven tools and machine learning algorithms to learn the EV charging behavior can improve scheduling algorithms. …”
    Get full text
    article
  16. 76
  17. 77

    Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study by Mutasim Baba, Fuad

    Published 2022
    “…It was found that the calibrated model achieved these metrics with RMSE of 0.3 ◦C, and MAD of 0.8 ◦C, and 85% of data points with an error less than 0.5 ◦C for a school building case.…”
    Get full text
    Get full text
    Get full text
  18. 78

    Parameter identification of PV solar cells and modules using bio dynamics grasshopper optimization algorithm by Mostafa Jabari (21841727)

    Published 2024
    “…However, accurate modelling and identification of PV cell parameters pose challenges, prompting the adoption of meta‐heuristic optimization algorithms. This work explores the limitations of existing algorithms and introduces a novel approach, the bio‐dynamics grasshopper optimization algorithm (BDGOA). …”
  19. 79

    Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment by Farhat Mahmood (15468854)

    Published 2023
    “…However, it does not account for the inaccuracies and uncertainties existing in the system, leading to sub-optimal temperatures. …”
  20. 80

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…”